Review Article: Cryptographic Algorithms for Enhancing Security in Cloud Computing. | ||||
Alfarama Journal of Basic & Applied Sciences | ||||
Article 5, Volume 4, Issue 3, July 2023, Page 433-455 PDF (1.26 MB) | ||||
Document Type: Review Article | ||||
DOI: 10.21608/ajbas.2022.141544.1105 | ||||
View on SCiNiTO | ||||
Authors | ||||
Doaa Salah El-Morshedy 1; Noha Ezzat El-Attar2; Ibrahim Mohamed Hanafy3; W.A. Awad4 | ||||
1Mathematics and computer science, faculty of science | ||||
2Faculty of Computers and AI, Benha University, Benha, Egypt | ||||
3Port said University, Faculty of Science, Department of Mathematics, Egypt. | ||||
4Faculty of Computers and Artificial Intelligence, Damietta University | ||||
Abstract | ||||
Cloud computing allows a huge amount of data storage and processing power to be available to users over the Internet. Many organizations are migrating from traditional data storage to cloud storage, which provides an efficient method to access data from anywhere and at any time. However, organizations' biggest barrier to adopting cloud computing is data security. Data security is one of the most critical aspects of cloud computing. As a result, there are various data security methods and implementations. Data encryption is the most commonly used method for protecting data security, which means that encrypting data before uploading it to the Cloud prevents unauthorized people from accessing it. This article provides an overview of existing symmetric and asymmetric cryptography algorithms. We cover Advanced Encryption Standard Algorithm (AES), Data Encryption Standard (DES), Triple Data Encryption (TDES), Twofish, and Blowfish for symmetric encryption techniques. Rivest - Shamir Adleman (RSA), Diffie-Hellman Key Exchange (DHKE), and El-Gamal are handled as asymmetric encryption algorithms. | ||||
Keywords | ||||
Asymmetric key cryptography; Cryptography; Symmetric key cryptography | ||||
Statistics Article View: 202 PDF Download: 320 |
||||